Wednesday, June 12, 2013

Security Expendibility: Kirk, Spock, McCoy, and Ensign Derp. Any Guess On Who's Not Coming Back?

Security has always been dispensable.  Just like the new security attachment on the away team in Star Trek, they are always the first to die.  

So as a Security conscious professional, how does one survive?  Well, your ship has come in, for Gartner has released what they think are the latest trends in Security. Seven to be precise. 

So proudly garner your red shirt and lead the pack to the alien planet  knowing that you have Gartner's list of 7 trends to guide you.  Live long and prosper.

1) The adoption of cloud services, especially when end users access them without the ITdepartment approval, means traditional security controls such as anti-virus and perimeter firewalls are increasingly ineffective. There’s a need to “shift up the stack” in security, “beyond networks and devices,” Wagner said.

2) All packets across the network are suspect. It’s extremely hard to detect compromises and infections in corporate resources, so monitoring should be considered a basic means to detect attacks. Gartner estimates by 2020, 75% of IT budgets will be set aside for rapid detection and response approaches, up from less than 10% in 2012.

3) IT security jobs generally fall into security operations (with a technical focus) or security management (with an active involvement in the business side of things). Wagner said the better course to take is to be the business-savvy CISO with creative approaches to security issues. The use of cloud resources are, to some extent, diminishing the enterprise need for technology expertise in terms of programmers, security testers, and database administrators, Wagner said.

4) “Bring Your Own Device” and mobile technologies are here to stay, and are driving new technology segments such as mobile-device management, containerization tools and mobile data protection. “People tried to say ‘no,’ and it didn’t work,” Wagner said. Security managers will likely find themselves moving from an “avoid” stance to phases such as accommodating, adopting and eventually, assimilating. Identity management and context-aware security will be key to supporting this.

5) Operational technology and management in business are under increasing security threat, and “it’s not just the power utilities or national infrastructure,” said Wagner. It’s all companies with important data-processing.

6) Identity and access management may need to be looked at from a new perspective. That’s because the power of social networking has businesses considering strategies that involve customer identity based on social-network identities rather than managing an account for them. The problem with this, of course, is that social networks generally don’t ask for proof of real-world identity, Wagner pointed out. On the other hand, he added, new accounts traditionally only relied on self-assertion. CISOs will need to ask security questions related to use of social networking as a basis for a customer account. “Is it a little creepy that Facebook knows what your customer is doing?” Wagner wondered aloud.

7) Rise of the “Security Free State”. This Gartner concept may be a little maverick for

many, but it’s being seriously presented as one security approach for the future. Basically, Gartner is saying the CISO can decide to reduce security controls in a bid to eliminate bureaucracy and costs, plus improve company morale, since “let’s face it, they don’t like us,” Wagner said. The Security Free State idea is “people-centric security” in which employees are allowed a privilege such as BYOD access to corporate e-mail in return for say, not keeping sensitive data on the device. There are no specific security controls except a monitoring process that would be set up to make sure the agreement was being maintained. If an employee does something wrong, the IT security division takes action. The idea behind it is “they’re being treated as people who do things right,” Wagner said.

So as far as the Wasabi team sees it, Gartner may have sage advice, except that crazy talk number 7.  This must have been thought up while someone was tripp'n on too much Niquel.  Because everyone knows, that given to their own devices, people shall digress.  Security is in place because of that very fact.  Save the Pollyanna speech for someone who hasn't a clue of what free range computing can do. Hah!  As we said, "Live long and prosper", or better yet, take that darn red shirt off!
Source(s):

So “Once more unto the breach, dear friends, once more;”
____________________________________________________________


About Rick Ricker

An IT professional with over 21 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.

For more information, contact Rick at (800) 399-6085 x502

No comments:

Post a Comment

Thanks for your input, your ideas, critiques, suggestions are always welcome...

- Wasabi Roll Staff